Skip to main content

Table 2 Time consumption and memory consumption of post-quantum digital signature schemes

From: Towards security recommendations for public-key infrastructures for production environments in the post-quantum era

Algorithm

Variant of the Algorithm

Key generation, μs

Signing, μs

Signature verification, μs

Public key size, byte

Signature size, byte

Secret key size, byte

Falcon

n = 768

13,882

562

87

1441

1036.02

6145

CRYSTALS-DILITHIUM

Very high

88

203

89

1760

3366

3856

Rainbow

Classic

34,980

277

317

710,640

156

511,448

Compressed

41,371

24,707

7094

206,744

156

64

GeMSS

GeMSS192

79,817

900,851

478

1,304,192

52

40,280

BlueGeMSS192

81,263

132,560

557

1,331,744

53

41,720

RedGeMSS192

83,529

3672

447

1,359,584

55

40,760

Picnic

picnic-L3-FS

18

10,064

8608

49

74,191.2

73

picnic-L3-UR

24

13,224

11,088

49

121,849

73

picnic2-L3-FS

20

443,936

157,228

49

27,062.15

73

SPHINCS+

sphincs-haraka-192f

14,844

439,211

21,963

48

35,664

96

sphincs-sha256-192s

195,818

4,390,120

3486

48

17,064

96

sphincs-shake256-192f

8767

240,173

12,405

48

35,664

96